n this Spotlight podcast* we’re joined by Jason Fruge, the VP of Business Application Cybersecurity at Onapsis to talk about the growing attacks against critical systems like ERP and General Ledger applications by SAP and Oracle. We also talk about why these critical systems often lag on key security measures.
Stay on top of the latest media coverage, and company and product announcements from the leader in business-critical application security and compliance solutions.

SAP security vulnerability could affect 40,000 customers
More than 40,000 SAP systems could be vulnerable to a security flaw that allows attackers to gain access to SAP systems. SAP released a patch to mitigate the vulnerability.

Critical flaw allows hackers to breach SAP systems with ease
SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now

Critical flaw allows hackers to breach SAP systems with ease
SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now

Critical SAP Bug Allows Full Enterprise System Takeover
The Department of Homeland Security recently released an alert for a bug that allows attackers to eventually read and modify financial records, change banking details, read PII, administer purchases, disrupt operations, achieve command execution, and delete or modify files

Cyber Daily: Companies Watch EU Court for Data-Transfer Ruling | SAP Issues Fix for Severe Vulnerability
Hello. European judges are expected to rule Thursday on whether a widely used legal mechanism for moving data between countries sufficiently protects the information, especially in the U.S. If the answer is no, lots of companies will have to find new legal tools to continue transferring data, WSJ Pro’s Catherine Stupp reports from Brussels.

Critical flaw in SAP NetWeaver Application Server Java
Une vulnérabilité découverte dans NetWeaver Application Server Java de SAP permet à un cyberpirate de prendre un contrôle système complet sans authentification. Un correctif à appliquer d'urgence est disponible.

SAP gap could affect 40,000 users
Esta vulnerabilidad se encuentra en un componente central que reside en la mayoría de las implementaciones predeterminadas de la compañía y que puede explotarse de forma remota sin necesidad de nombre de usuario y contraseña.